Abstract— Mobile agents are often used in wireless sensor networks for distributed target detection with the goal of minimizing the transmission of non-critical data that negativ...
Andreas Konstantinidis 0002, Christoforos Charalam...
Estimating the number of people in a crowded environment is a central task in civilian surveillance. Most vision-based counting techniques depend on detecting individuals in order...
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
Surveillance has been a typical application of wireless sensor networks. To conduct surveillance of a given area in real life, one can use stationary watch towers, or can also use...
Abstract-- Wireless Sensor Networks (WSNs) rely on innetwork aggregation for efficiency, however, this comes at a price: A single adversary can severely influence the outcome by co...
Parisa Haghani, Panagiotis Papadimitratos, Marcin ...